Gafgyt

Malware Profile Updated 3 months ago
Download STIX
Preview STIX
Gafgyt, also known as Bashlite, is a form of malware that infects Linux architecture operating systems to launch Distributed Denial of Service (DDoS) attacks. The malware infiltrates systems through suspicious downloads, emails, or websites, and once inside, it can steal personal information, disrupt operations, or even hold data hostage for ransom. A variant of the Gafgyt bot exploits vulnerabilities in systems to expand DDoS attacks on Linux-based systems. By downloading and executing malicious scripts, this Gafgyt variant establishes connections with command-and-control servers, awaiting instructions to launch coordinated attacks on targeted victims. Researchers from Unit 42, Palo Alto Networks, and Fortinet have observed multiple attacks over the past month focused on exploiting system vulnerabilities. These include attacks from popular Linux botnets such as Mirai and Gafgyt which usually generate random IP addresses as scanning destinations. In addition to these, other botnets including Moobot, Miori, the Golang-based agent "AGoent," a Gafgyt variant, and an unnamed variant of the infamous Mirai botnet have been identified as part of these attack campaigns. Threat actors are taking advantage of unpatched devices to dispatch various botnets — including Moobot, Miori, AGoent, a Gafgyt variant, and variants of the infamous Mirai botnet — that can compromise the devices for DDoS and further nefarious activity. Researchers found that the notorious Mirai and Gafgyt malware families, known for turning devices into botnets, drove the majority of attacks, constituting 66% of blocked payloads. Other commonly used malwares include ShellBot, Tsunami, ChinaZ DDoS Bot, XMRig CoinMiner, and Gafgyt.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Mirai Botnet
3
The Mirai botnet is a type of malware, malicious software designed to exploit and harm computer systems. It spreads by exploiting vulnerabilities in different systems, most notably through Ivanti Connect Secure bugs and the JAWS Webserver. Once inside a system, it can steal personal information, dis
Bashlite
2
Bashlite, also known as Gafgyt, is a type of malware that specifically targets Linux architecture operating systems. This malicious software is designed to infiltrate your system through dubious downloads, emails, or websites and can cause significant damage without your knowledge. Once Bashlite has
Ziggy
1
Ziggy is a malicious software (malware) known for its damaging and exploitative capabilities. This malware, along with xmrig, can be downloaded and executed via specific scripts. It is associated with various hosted files including TDGG, api.key, tmate, tt.sh, sGAU.sh, t.sh, x86_64.so, xmr.sh, xmrig
Tsunami
1
The "Tsunami" malware, a malicious software designed to exploit and damage computer systems, has caused significant cybersecurity disruptions globally. This malware, whose variants include xmrigDeamon, Bioset, dns3, xmrigMiner, docker-update, dns, 64[watchdogd], 64bioset, 64tshd, armbioset, armdns,
Kaiten
1
Kaiten, also known as Tsunami, is a malware variant that operates as a Distributed Denial of Service (DDoS) bot and an IRC bot. It targets vulnerable Internet of Things (IoT) devices and poorly protected Linux SSH servers, often being distributed alongside other DDoS bots like Mirai and Gafgyt. The
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Botnet
Ddos
Vulnerability
Linux
Bot
Exploit
Denial of Se...
Fortiguard
Zyxel
Apache
Apache Struts
Tp
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
Miraiis related to
8
Mirai is a type of malware that primarily targets Internet of Things (IoT) devices to form botnets, which are networks of private computers infected with malicious software and controlled as a group without the owners' knowledge. In early 2022, Mirai botnets accounted for over 7 million detections g
Gafgyt VariantUnspecified
3
The Gafgyt variant is a malicious software that poses a significant threat to computer systems and devices. This malware can infiltrate your system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it has the potential to steal personal information,
MoobotUnspecified
2
Moobot is a malicious software (malware) that has been causing significant disruption in the digital world. The malware, which can infiltrate systems through various methods such as suspicious downloads, emails, or websites, is known for its capability to steal personal information, disrupt operatio
MoziUnspecified
2
Mozi is a type of malware, a malicious software designed to exploit and damage computer systems or devices. It can infiltrate systems via suspicious downloads, emails, or websites, often unbeknownst to the user. Once it gains access, Mozi has the potential to steal personal information, disrupt oper
AgoentUnspecified
1
AGoent is a sophisticated malware, a malicious software designed to exploit and damage computer systems. This Golang-based agent bot has been observed in multiple attacks, exploiting a year-old vulnerability to launch various nefarious activities. It operates by fetching the script file "exec.sh" fr
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
CVE-2023-1389Unspecified
2
CVE-2023-1389 is a significant software vulnerability, specifically a command injection flaw, found in TP-Link Archer AX21 routers. The flaw was publicly released in March of this year and has since been exploited by malicious actors to gain unauthorized access to devices. Attack traffic through the
CVE-2017-18368Unspecified
1
None
Source Document References
Information about the Gafgyt Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
BankInfoSecurity
3 months ago
Exploited TP-Link Vulnerability Spawns Botnet Threats
DARKReading
3 months ago
Various Botnets Pummel Year-Old TP-Link Flaw in IoT Attacks
Fortinet
3 months ago
Botnets Continue Exploiting CVE-2023-1389 for Wide-Scale Spread | FortiGuard Labs
CERT-EU
6 months ago
Securing Public Sector Against IoT Malware in 2024 | Zscaler
CERT-EU
7 months ago
Attackers Targeting Poorly Managed Linux SSH Servers
CERT-EU
a year ago
DDoS Malware Distributed Through Compromised Linux SSH Servers
CERT-EU
a year ago
Cybersecurity threatscape: year 2021 in review
SANS ISC
9 months ago
Routers Targeted for Gafgyt Botnet [Guest Diary] - SANS Internet Storm Center
Securityaffairs
9 months ago
Who is behind the Mozi Botnet kill switch?
Securityaffairs
a year ago
Gafgyt botnet is targeting EoL Zyxel routers
CERT-EU
9 months ago
IoT security threats highlight the need for zero trust principles - Help Net Security
MITRE
a year ago
Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows
BankInfoSecurity
9 months ago
Breach Roundup: Winter Vivern Hunting For Emails
Fortinet
a year ago
2022 IoT Threat Review | FortiGuard Labs
CERT-EU
a year ago
New Strain of Sotdas Malware Discovered | Qualys Security Blog
CERT-EU
a year ago
Linux Servers Hacked to Launch DDoS Attacks and Mine Monero Cryptocurrency
CERT-EU
10 months ago
Mirai Botnet’s New Wave: hailBot,kiraiBot, catDDoS, and Their Fierce Onslaught
MITRE
a year ago
Chaos: a Stolen Backdoor Rising Again - GoSecure
Unit42
a year ago
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats
Unit42
a year ago
IoT Under Siege: The Anatomy of the Latest Mirai Campaign Leveraging Multiple IoT Exploits